dblp.uni-trier.dewww.uni-trier.de

Ramarathnam Venkatesan

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
67EESumit Gulwani, Saurabh Srivastava, Ramarathnam Venkatesan: Constraint-Based Invariant Inference over Predicate Abstraction. VMCAI 2009: 120-135
2008
66EEDimitar Jetchev, Ramarathnam Venkatesan: Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys. CRYPTO 2008: 75-92
65EEMatthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, Ramarathnam Venkatesan: The Superdiversifier: Peephole Individualization for Software Protection. IWSEC 2008: 100-120
64EEMatthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan: The Long-Short-Key Primitive and Its Applications to Key Security. IWSEC 2008: 279-297
63EESumit Gulwani, Saurabh Srivastava, Ramarathnam Venkatesan: Program analysis as constraint solving. PLDI 2008: 281-292
62EEStephen D. Miller, Ramarathnam Venkatesan: Non-degeneracy of Pollard Rho Collisions CoRR abs/0808.0469: (2008)
2007
61EENathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan: MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. CT-RSA 2007: 1-19
60EEAvinash V. Varadarajan, Ramarathnam Venkatesan, C. Pandu Rangan: Data structures for limited oblivious execution of programs while preserving locality of reference. Digital Rights Management Workshop 2007: 63-69
59EEMariusz H. Jakubowski, Ramarathnam Venkatesan: Randomized radon transforms for biometric authentication via fingerprint hashing. Digital Rights Management Workshop 2007: 90-94
58EESrivatsan Laxman, Prasad Naldurg, Raja Sripada, Ramarathnam Venkatesan: Connections between Mining Frequent Itemsets and Learning Generative Models. ICDM 2007: 571-576
57EEDavid Jao, Dimitar Jetchev, Ramarathnam Venkatesan: On the Bits of Elliptic Curve Diffie-Hellman Keys. INDOCRYPT 2007: 33-47
56EEBertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere: Run-Time Randomization to Mitigate Tampering. IWSEC 2007: 153-168
55EENenad Dedic, Mariusz H. Jakubowski, Ramarathnam Venkatesan: A Graph Game Model for Software Tamper Protection. Information Hiding 2007: 80-95
54EEMariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan: Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. Information Hiding 2007: 96-111
53EEMatthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan: Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. MM&Sec 2007: 129-140
52EEDavid Jao, S. Ramesh Raju, Ramarathnam Venkatesan: Digit Set Randomization in Elliptic Curve Cryptography. SAGA 2007: 105-117
51EEDebapratim De, Abishek Kumarasubramanian, Ramarathnam Venkatesan: Inversion Attacks on Secure Hash Functions Using satSolvers. SAT 2007: 377-382
2006
50EEStephen D. Miller, Ramarathnam Venkatesan: Spectral Analysis of Pollard Rho Collisions. ANTS 2006: 573-581
49EEBertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan: Proteus: virtualization for diversified tamper-resistance. Digital Rights Management Workshop 2006: 47-58
48EENathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan: MV3: A new word based stream cipher using rapid mixing and revolving buffers CoRR abs/cs/0610048: (2006)
47EEStephen D. Miller, Ramarathnam Venkatesan: Spectral Analysis of Pollard Rho Collisions CoRR abs/math/0603727: (2006)
2005
46 Subhamoy Maitra, C. E. Veni Madhavan, Ramarathnam Venkatesan: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings Springer 2005
45EEMichael Malkin, Ramarathnam Venkatesan: Comparison of Texts Streams in the Presence of Mild Adversaries. ACSW Frontiers 2005: 179-186
44EEDavid Jao, Stephen D. Miller, Ramarathnam Venkatesan: Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? ASIACRYPT 2005: 21-40
43 Mehmet Kucukgoz, Oztan Harmanci, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan: Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics. Security, Steganography, and Watermarking of Multimedia Contents 2005: 363-369
42EEMustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan: An improved attack analysis on a public-key spread spectrum watermarking. Multimedia Syst. 11(2): 133-142 (2005)
41EEMehmet Kivanç Mihçak, Ramarathnam Venkatesan, Tie Liu: Watermarking via optimization algorithms for quantizing randomized semi-global image statistics. Multimedia Syst. 11(2): 185-200 (2005)
2004
40 Suleyman Serdar Kozat, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak: Robust perceptual image hashing via matrix invariants. ICIP 2004: 3443-3446
39EETie Liu, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak: Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics. MM&Sec 2004: 124-132
38EEMustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan: An improved attack analysis on a public-key spread spectrum watermarking. MM&Sec 2004: 41-45
37EEDavid Jao, Stephen D. Miller, Ramarathnam Venkatesan: Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves CoRR math.NT/0411378: (2004)
2003
36EEMatthew Cary, Ramarathnam Venkatesan: A Message Authentication Code Based on Unimodular Matrix Groups. CRYPTO 2003: 500-512
2002
35EEJeremy Horwitz, Ramarathnam Venkatesan: Random Cayley Digraphs and the Discrete Logarithm. ANTS 2002: 416-430
34EEMehmet Kivanç Mihçak, Ramarathnam Venkatesan, Mustafa Kesal: Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks. Information Hiding 2002: 226-246
33EEYuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski: Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. Information Hiding 2002: 400-414
32EEMyung M. Bae, Ramarathnam Venkatesan, Bella Bose: Data Rearrangement between Radix-k and Lee Distance Gray Codes in k-ary n-cubes. J. Parallel Distrib. Comput. 62(1): 19-37 (2002)
2001
31EEMehmet Kivanç Mihçak, Ramarathnam Venkatesan: New Iterative Geometric Methods for Robust Perceptual Image Hashing. Digital Rights Management Workshop 2001: 13-21
30EERamarathnam Venkatesan, Vijay V. Vazirani, Saurabh Sinha: A Graph Theoretic Approach to Software Watermarking. Information Hiding 2001: 157-168
29EEMehmet Kivanç Mihçak, Ramarathnam Venkatesan: A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. Information Hiding 2001: 51-65
28EELeonid A. Levin, Ramarathnam Venkatesan: An Average Case NP-complete Graph Problem CoRR cs.CC/0112001: (2001)
2000
27 Ramarathnam Venkatesan, Mariusz H. Jakubowski: Image Watermarking with Better Resilience. ICIP 2000
26 Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jakubowski, Pierre Moulin: Robust Image Hashing. ICIP 2000
1999
25EEWilliam Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan: High-Speed Pseudorandom Number Generation with Small Memory. FSE 1999: 290-304
1998
24EEWilliam Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan: Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. CRYPTO 1998: 390-407
23EEVictor Boyko, Marcus Peinado, Ramarathnam Venkatesan: Speeding up Discrete Log and Factoring Based Schemes via Precomputations. EUROCRYPT 1998: 221-235
22EEMariusz H. Jakubowski, Ramarathnam Venkatesan: The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. EUROCRYPT 1998: 281-293
21EEDan Boneh, Ramarathnam Venkatesan: Breaking RSA May Not Be Equivalent to Factoring. EUROCRYPT 1998: 59-71
20EEWilliam Aiello, Stuart Haber, Ramarathnam Venkatesan: New Constructions for Secure Hash Functions. FSE 1998: 150-167
19EEWilliam Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan: Security amplification by composition: The case of doubly-iterated ideal ciphers CoRR cs.CR/9809031: (1998)
18 William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan: Design of Practical and Provably Good Random Number Generators. J. Algorithms 29(2): 358-389 (1998)
17EEMoni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation. J. Cryptology 11(2): 87-108 (1998)
1997
16 Marcus Peinado, Ramarathnam Venkatesan: Highly Parallel Cryptographic Attacks. PVM/MPI 1997: 367-374
15 Dan Boneh, Ramarathnam Venkatesan: Rounding in Lattices and its Cryptographic Applications. SODA 1997: 675-681
14 Sulaiman Al-Bassam, Ramarathnam Venkatesan, Sultan Al-Muhammadi: New single asymmetric error-correcting codes. IEEE Transactions on Information Theory 43(5): 1619-1623 (1997)
1996
13EEDan Boneh, Ramarathnam Venkatesan: Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. CRYPTO 1996: 129-142
12EEWilliam Aiello, Ramarathnam Venkatesan: Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel. EUROCRYPT 1996: 307-320
1995
11 William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan: Design of Practical and Provably Good Random Number Generators (Extended Abstract). SODA 1995: 1-9
10 Dennis Grinberg, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan, Victor K. Wei: Splay Trees for Data Compression. SODA 1995: 522-530
9EEWilliam Aiello, Mihir Bellare, Ramarathnam Venkatesan: Knowledge on the average-perfect, statistical and logarithmic. STOC 1995: 469-478
1994
8 William Aiello, Ramarathnam Venkatesan, Moti Yung: Coins, Weights and Contention in Balancing Networks. PODC 1994: 193-205
1993
7EERafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Interactive Hashing Simplifies Zero-Knowledge Protocol Design. EUROCRYPT 1993: 267-273
1992
6EEMoni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract). CRYPTO 1992: 196-214
5 Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Secure Commitment Against A Powerful Adversary. STACS 1992: 439-448
4 Ramarathnam Venkatesan, Sivaramakrishnan Rajagopalan: Average Case Intractability of Matrix and Diophantine Problems (Extended Abstract) STOC 1992: 632-642
1991
3 Sulaiman Al-Bassam, Bella Bose, Ramarathnam Venkatesan: Burst and Unidirectional Error Detecting Codes. FTCS 1991: 378-384
1990
2 Oded Goldreich, Russell Impagliazzo, Leonid A. Levin, Ramarathnam Venkatesan, David Zuckerman: Security Preserving Amplification of Hardness FOCS 1990: 318-326
1988
1 Ramarathnam Venkatesan, Leonid A. Levin: Random Instances of a Graph Coloring Problem Are Hard STOC 1988: 217-222

Coauthor Index

1William Aiello [8] [9] [11] [12] [18] [19] [20] [24] [25]
2Sulaiman Al-Bassam [3] [14]
3Sultan Al-Muhammadi [14]
4Bertrand Anckaert [49] [56]
5Myung M. Bae [32]
6Mihir Bellare [9] [19] [24]
7Dan Boneh [13] [15] [21]
8Bella Bose [3] [32]
9Koen De Bosschere (Koenraad De Bosschere) [56]
10Victor Boyko [23]
11Matthew Cary [33] [36] [64]
12Yuqun Chen [33]
13Giovanni Di Crescenzo [19] [24]
14Debapratim De [51]
15Nenad Dedic [55]
16Oded Goldreich [2]
17Dennis Grinberg [10]
18Sumit Gulwani [63] [67]
19Stuart Haber [20]
20Oztan Harmanci [43]
21Jeremy Horwitz [35]
22Russell Impagliazzo [2]
23Matthias Jacob [53] [64] [65]
24Mariusz H. Jakubowski [22] [26] [27] [33] [49] [53] [54] [55] [56] [59] [64] [65]
25David Jao [37] [44] [52] [57]
26Dimitar Jetchev [57] [66]
27Nathan Keller [48] [61]
28Mustafa Kesal [34] [38] [42]
29S.-M. Koon [26]
30Suleyman Serdar Kozat [40]
31Mehmet Kucukgoz [43]
32Abishek Kumarasubramanian [51]
33Srivatsan Laxman [58]
34Leonid A. Levin [1] [2] [28]
35Tie Liu [39] [41]
36C. E. Veni Madhavan [46]
37Subhamoy Maitra [46]
38Michael Malkin [45]
39Mehmet Kivanç Mihçak [29] [31] [34] [38] [39] [40] [41] [42] [43]
40Stephen D. Miller [37] [44] [47] [48] [50] [61] [62]
41Ilya Mironov [48] [61]
42Pierre Moulin [26]
43Prasad Naldurg [54] [58] [65]
44Moni Naor [6] [17]
45Rafail Ostrovsky [5] [6] [7] [17]
46Ruoming Pang [33]
47Vijay Patankar [54]
48Marcus Peinado [16] [23]
49Sivaramakrishnan Rajagopalan [4] [10] [11] [18] [25]
50S. Ramesh Raju [52]
51C. Pandu Rangan (Chanrasekharan Pandu Rangan) [60]
52Chit Wei Saw [65]
53Saurabh Sinha [30] [33]
54Raja Sripada [58]
55Saurabh Srivastava [63] [67]
56Avinash V. Varadarajan [60]
57Vijay V. Vazirani [30]
58Victor K.-W. Wei (Victor K. Wei, Victor Keh-Wei Wei) [10]
59Moti Yung (Mordechai M. Yung) [5] [6] [7] [8] [17]
60David Zuckerman [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)